Data in Motion: It All Starts With Ingestion

DataTorrent

Ingesting and extracting data from Hadoop can be a frustrating, time consuming activity for many enterprises. DataTorrent Data Ingestion is a standalone big data application that simplifies the collection.
Watch Now

Spotlight

This video is part of an online course, Intro to Data Science. Check out the course here: https://www.udacity.com/course/ud359. This course was designed as part of a program to help you and others become a Data Analyst.


OTHER ON-DEMAND WEBINARS

How to Gain a Crisis Advantage with Real-Time Information

To reduce the impact of an unfolding crisis, companies need a clear, accurate and early line of sight into emerging risks. Leaders can then act with confidence and seize opportunities to preserve brand reputation while driving operational excellence. To demonstrate how real-time information can help companies gain advanced warn

A Better Alternative: Advanced Analytics and Alternative Data in Consumer Lending

The unsecured personal loan market is hot and growing rapidly. It is also prime testing grounds for the use of alternative sources of data and advanced analytics in marketing and loan decisioning, given the number of traditional and non-traditional lenders competing to meet consumer demand. Join Equifax and Aite Group as we dis

Expand Access to Credit with Alternative Data from Equifax

Equifax analysis indicates that approximately 91.5 million consumers in the US either have no credit file, or have insufficient information in the file to generate a traditional credit score. Your visibility into credit applicants determines whether you will offer more loans or miss profitable opportunities. By giving you incre

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs. Protocols in place for many